Free Cyber Security PDF Library: From Basics to Advanced

Computer Security focuses on protecting systems and data from threats, covering cryptography, network security, ethical hacking, and cybersecurity best practices.

36 Courses
54,667 Total Downloads

Ethical Hacking

Description: Download free Ethical Hacking PDF. Learn hacktivism, penetration testing, cyber-jihad forums, and legal cases. Perfect for cybersecurity students and beginners.

Size: 3.98 MB Downloads: 6

Cyber Security for Beginners

Description: Practical cybersecurity guide for beginners: actionable steps on passwords, phishing, encryption, devices, and basic policies for individuals and teams.

Size: 6.09 MB Downloads: 5,838

Security of Ubiquitous Computing Systems

Description: Explore essential research papers on cryptography, covering attacks, protocols, and security measures. A must-read for enthusiasts and professionals.

Size: 2.31 MB Downloads: 443

Fundamentals of Cryptology

Description: Download free Fundamentals of Cryptology PDF. Learn encryption methods, cryptographic algorithms, security protocols, and key management.

Size: 2.35 MB Downloads: 1,953

Handbook of Applied Cryptography

Description: Comprehensive overview of applied cryptography: algorithms, protocols, and implementation guidance for students and professionals seeking practical mastery.

Size: 5.95 MB Downloads: 1,572

Security Vulnerabilities of Mobile Devices

Description: Practical strategies to secure mobile devices from malware, sandbox escapes, OTA interception, side-channel and USB attacks, with hands-on mitigation guidance.

Size: 407.90 KB Downloads: 10,188

Filtering Out Spam

Description: Practical guide to filtering spam with Procmail and regular expressions—email recipes, string processing, Base64 and HTML handling, and hands-on projects.

Size: 304.56 KB Downloads: 2,773

Bots, Botnets, and the DDoS Attacks

Description: Explore the world of bots and botnets, their command structures, and DDoS attacks in this comprehensive guide to network security.

Size: 372.23 KB Downloads: 5,187

Malware: Viruses and Worms

Description: Explore the anatomy of computer viruses and worms with practical examples in Perl and Python. Enhance your cybersecurity knowledge today!

Size: 376.36 KB Downloads: 6,770

Attacks for Cyber Espionage with Trojans

Description: Explore how ransomware and trojans operate, their attack vectors, and prevention strategies in this comprehensive overview of cyber threats.

Size: 372.56 KB Downloads: 3,465

Web Security: Cross-Site Scripting and Other Browser-Side Exploits

Description: Explore the fundamentals of web security, including cookies, XSS attacks, and how to protect against vulnerabilities in web applications.

Size: 253.79 KB Downloads: 2,925

Web Security: PHP Exploits, SQL Injection, and the Slowloris Attack

Description: Explore web security basics with a focus on PHP exploits, SQL injection, and Slowloris attack. Learn to protect your web servers effectively.

Size: 418.92 KB Downloads: 4,290

The Dictionary and the Rainbow-Table Attack

Description: Explore dictionary and rainbow table attacks on password security, learn defense methods, and understand password hashing techniques in detail.

Size: 285.87 KB Downloads: 2,023

Port and Vulnerability Scanning

Description: Learn essential concepts of Ethernet frames, port & vulnerability scanning, packet sniffing, and intrusion detection from this comprehensive computer security.

Size: 289.74 KB Downloads: 2,023

Buffer Overflow Attack

Description: Learn key concepts and defenses of buffer overflow attacks with case studies on telnet service vulnerabilities for computer security professionals.

Size: 283.73 KB Downloads: 1,132

Finite Fields (PART 4) - Finite Fields of the Form GF(2n)

Description: Practical guide to GF(2^n) arithmetic: bitwise addition, shift-and-XOR multiplication, modular polynomial reduction, inversion methods, and code examples.

Size: 179.46 KB Downloads: 549

Finite Fields (PART 3) - Polynomial Arithmetic

Description: Explore polynomial arithmetic over finite fields with practical examples, key concepts, and applications in cryptography from Avi Kak’s comprehensive lecture.

Size: 99.49 KB Downloads: 509

Finite Fields (PART 2) - Modular Arithmetic

Description: Download free Finite Fields - Modular Arithmetic PDF. Learn modular operations, multiplicative inverses, GCD calculations, and field properties.

Size: 232.48 KB Downloads: 500

Finite Fields (PART 1) - Groups, Rings, and Fields

Description: Explore the fundamentals of finite fields and their crucial role in modern computer security and cryptographic algorithms. Master the math behind encryption.

Size: 135.44 KB Downloads: 1,154

DNS and the DNS Cache Poisoning Attack

Description: Learn DNS fundamentals and how DNS cache poisoning attacks work with expert insights from Avi Kak's comprehensive computer security lecture.

Size: 618.02 KB Downloads: 1,367